Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How to crack edmodo passwords with hashcat?
Hello forum, I need to know how is possible a wordlist attack with hashcat against bcryptmd5 Edmodo hash?
How can I set properly hashcat in order to do that?

Afaik there is no hashcat kernel available somewhere so far which does bcryptmd5. Someone who is well in hashcat kernel programming should be able to add this as it's just applying md5 before the bcrypt.
MDXfind is able to do it already, if you want to try with it.
I never used mdxfind can you just show me how can I set bcryptmd5 as algorithm if I have this format ($bcrypt : salt) in order to try to crack it with a wordlist attack? I'm on osx</r>
You just need the hashlist in the format as it is on So just the bcrypts (as the salt is included in the bcrypt hash).

Then you execute
./mdxfind.osx -h ^bcryptmd5$ -f <hashlist> <wordlist> >> found.txt
I'm trying... There are 2 hashes bcryptmd5 in the file but appears "Searching through 0 unique hashes from hashes.txt". What's wrong?


./mdxfind.osx -h ^bcryptmd5$ -f hashes.txt 1.txt >> found.txt
Working on hash types: BCRYPTMD5
Took 0.00 seconds to read hashes
Searching through 0 unique hashes from hashes.txt
Maximum hash chain depth is 0
Minimum hash length is 512 characters
Using 8 cores
Working on 1.txt, w=0, line 114640848, Found=0
Working on 1.txt, w=0, line 226099926, Found=0
241,584,732 lines processed in 34 seconds
7105433.29 lines per second
33.98 seconds hashing, 0 total hash calculations
0.00M hashes per second (approx)
1 total files
None found, sorry!
Ok with s3in!c via p.m i solved testing with some real hashes.
So, of an Edmondo hash you have to delete a char every 2 for the first 65 chars and then append the rest in order to get a valid string.
For this scope I made a simple script in c# that automatically do this (ofc you can code it with whatever language you want by yourself)... You can get it here:
After, you can copy generated string of 60 chars(check that it's 60 from the script itself or probably it is not valid) into a file and proceed with the command gave above from s3in!c to start a dictionary attack with mdxfind.
Thanks to s3in!c for helping me and very nice program (mdxfind)!

Forum Jump:

Users browsing this thread: 1 Guest(s)